Tagged Questions

PKI is short for Public Key Infrastructure. The foundation of a PKI is the certificate authority (CA), which issues digital certificates that authenticate the identity of organizations and individuals over a public system such as the Internet.

The diagram below illustrates chaining digital certificates up to a publicly trusted Root Certificate:
I have been researching how trusted root authorities (such as GlobalSign or Verisign) are used ...

I am new to Network Security and learning about various security features like Diffie-Helmann and others.
I understand that the Public key send by the server to the client needs to certified that it ...

Are there any practical limitations? Govt driving license, passport, SSN could be digitally signed making it easy for anyone to validate. They can have a qr code in them which can be easily validated ...

I am new to cryptography and I want to know the details of how a Certificate Authority issues a digital certificate.
From what I know (please correct me if I'm wrong at any parts of my explanation):
...

I've got a very simple but for me a difficult question.
I analyzed the public key cryptography and understand the process.
But I didn't understand why is only the receiver able to decrypt to message.
...

I'm trying to implement a short scale electronic voting application in a domain comprised of no more than 100 clients. System administrator is able to create new election instances and each client is ...

I want to use TLS to encrypt the communication between peers in a P2P network. Each peer has a well known 256bit peer identifier (the public key of a 256bit elliptic curve keypair). Both peers need ...

I'm trying to understand the logic of CAs, trust and client certificates. I have a general understanding but am having a tough time bridging some gaps.
In a hypothetical situation a software system ...

I want to store 5-10 lines of Text Info in a PKI Certificate.
All I want is that when using common tools like openssl command line or certutil from Microsoft, this text info should be displayed as is.
...

Consider protocol like QUIC or MinimaLT which are essentially layer4 replacement for TCP/UDP (riding on top of UDP currently because of fear of random firewalls dropping new L4 protocol).
From crypto ...

How does certificate revocation list (CRL) work? How can I send a request to the CA to add my current private key to the CRL, so no one except me can add my certificate to the CRL?
Related:
- How can ...

To get a public key of some organization or someone we want to send an encrypted message to, we need to make a request to CA asking that organization's public key. CA then returns X509 certificate. It ...

Suppose Alice and Bob are exchanging messages using S/MIME, protected by certificates that have been issued by either the same CA or by two mutually independent CAs. There exists an adversary Mallory ...

What is the probability that two separate RSA public moduli are the same? For example, consider a 2048-bit modulus. The number seems to be huge, but the choice for prime factors p and q is much more ...

In Public key infrastructure, the MD5 of a piece of data is encrypted with the private key of a sender and this encrypted MD5 – along with the data – is again encrypted using an algorithm like AES or ...

I'm working on a messaging service that lets users author messages and have them signed with an RSA key. The key is used for identity purposes only and can be revoked, so compromising the private key ...